On Tue, May 28, 2024 at 09:32:29PM -0400, John Hill via Postfix-users wrote:
> On 5/28/24 9:23 PM, Viktor Dukhovni via Postfix-users wrote: > > -o { smtpd_recipient_restrictions = > > reject_rbl_client zen.spamhaus.org=127.0.0.4, > > reject_sender_login_mismatch, > > permit_sasl_authenticated, > > reject } > > > I had experimented and came close to this. > > I will use it. > > Question as I use zen 127.0.0.[2..11] on port 25 This is includes the PBL, covering much of the "dynamic" ISP consumer address space, including homes, hotels, airports, ... You probably don't want to block these. The XBL (127.0.0.4) is a conservative choice. You might in fact want to reject XBL IPs early, before they even attempt authentication. So I have: 465 inet n - n - - smtpd -o smtpd_delay_reject=no -o {smtpd_client_restrictions=reject_rbl_client zen.spamhaus.org=127.0.0.4} -o smtpd_relay_restrictions=permit_sasl_authenticated,reject ... submission inet n - n - - smtpd -o smtpd_delay_reject=no -o {smtpd_client_restrictions=reject_rbl_client zen.spamhaus.org=127.0.0.4} -o smtpd_relay_restrictions=permit_sasl_authenticated,permit_mynetworks,reject (The "permit_mynetworks" is for a couple of machine-to-machine submission use cases). -- Viktor. _______________________________________________ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-le...@postfix.org